‘Technically’ Imaginable to Extract User Keys? Ledger Addresses Deleted Tweet
Crypto hardware pockets manufacturer Ledger has been the heart of controversy after asserting “Ledger Enhance,” an non-obligatory security feature that can allow customers to web greater their sources after losing their non-public keys.
A tweet on Would possibly well 17 from a Ledger customer enhance agent extra fueled negative public plan of the company.
“Technically speaking it’s some distance and constantly has been that you simply’re going to be in a sing to factor in to jot down firmware that facilitates key extraction. You need to even dangle constantly relied on Ledger now to no longer deploy such firmware whether or now no longer you knew it or now no longer,” read the tweet, which has since been deleted.
The crypto community used to be naturally afraid by the message, which apparently implied that the company constantly had the draw in which to work this firmware into their product without customers vibrant any greater.
Ledger addressed the deleted tweet in an update about a hours later, explaining that a customer enhance agent had former “advanced wording” in an strive to elaborate how the company’s hardware wallets work.
[2/3] We’ve deleted it as a result of we don't desire other folks to continue to be confused by this, and are changing it with Tweet threads which handle all recurrently requested questions and considerations in the most understandable and correct draw that you simply’re going to be in a sing to factor in.
— Ledger Toughen (@Ledger_Support) Would possibly well 18, 2023
Ledger CTO Charles Guillemet also penned a detailed Twitter thread to handle misconceptions and show how the firmware works in attain.
“The usage of a pockets requires a minimal amount of belief. In case your hypothesis is that your pockets provider is the attacker, you’re doomed,” stated Guillemet.
“If the pockets needs to implement a backdoor, there are heaps of ways to develop it, in the random number technology, in the cryptographic library, in the hardware itself. It’s even that you simply’re going to be in a sing to factor in to web signatures so that the non-public key can even even be retrieved finest by monitoring the blockchain,” he added.
In his witness, an birth supply codebase doesn’t solve the topic and it’s some distance not likely to dangle a guarantee that the electronic system or the firmware that runs it’s some distance rarely backdoored.
22/
Once you happen to love to can dangle to be entirely trustless, you'll must be taught electronics to manufacture your computer, be taught ASM to manufacture your compiler, then manufacture a pockets stack, your have faith node and synchronizer, you'll must be taught cryptography to manufacture your have faith signature stack.— Charles Guillemet (@P3b7_) Would possibly well 18, 2023
He concluded by telling customers that a hardware pockets is mostly former as a signing system, which safeguards non-public keys.
“Your non-public keys by no draw depart away the hardware pockets. At any time when they’re former, your consent is requested,” he stated.
Source credit : unchainedcrypto.com